Abnormal Network Traffic Detection Based on Semi-Supervised Machine Learning

Size: px
Start display at page:

Download "Abnormal Network Traffic Detection Based on Semi-Supervised Machine Learning"

Transcription

1 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: Abnormal Network Traffic Detection Based on Semi-Supervised Machine Learning Min-jie ZHU 1,* and Nai-wang GUO 2,* 1 Department of Science, Information and Communication, SGSMEPC, Shanghai, China 2 Center of Grid Technology, SGSEPRI, Shanghai, China * Corresponding author Keywords: Intrusion detection, Machine learning, Classification, Decision tree. Abstract. Network intrusions will cause abnormal network traffic flow. The abnormal network traffic detection can be used to identify the network intrusions. The traditional intrusion detection system is based on pattern recognition which only can be used for well-known network attack behavior. Machine learning can be used to abstract the characters of a class of objects. In this paper we use machine learning classifiers to distinguish abnormal network traffic from the normal traffic background. The experiments show that this is efficient to detect new intrusion. In order to increase the accuracy for new attack detection, our scheme select the with high confidence samples from testing set to expand the training set which is a semi supervised strategy. Introduction Network attacks are illegal access on computer network that exploit the vulnerabilities in target systems. Most network attacks are completed remotely which will bring extra network traffic. These network attacks are called intrusion. Intrusion detection system (IDS) is used to detect such kind of network attack. Traditional IDS is based on pattern recognition technique which is applicable on known attack pattern only. However, more and more new attack technique is emerging in recent years. A new attack pattern cannot be predicted previously before it appears. New attack is called zero-day attack which means it is new for network defense system. The traditional IDS is also invalid for zero-day attack. In this paper we focus on new technique to detect unknown zero-day attack based on machine learning. The main concept is network attack will bring abnormal network traffic even it utilizes new vulnerability. The abnormal traffic can be detected by its special characters in a time window. The main issue is how to characterize the network traffic and how to define the character of abnormal traffic. It is known that the behavior and procedure of attackers are similar even they use new vulnerability. Machine learning can be used to extract unknown knowledge from mass of data. If we use labeled attack traffic data to train a machine learning model, it can be used to detect a new attack with similar character. Specifically, we use classification model to distinguish abnormal traffic from normal traffic. It is suitable to protect the high-value network such as energy network. Classification of network traffic is a fundamental problem in network security and management. The rapid growth of the Internet not only gives rise to new and different kinds of applications, but also leads to dynamic changes in network traffic over time. Accurate traffic classification has been already studied in a number of network security problems such as, intrusion detection, detection and prevention of various network attacks (like Denial of Service attacks), anomaly detection, lawful inspection, cybercrime forensic analyses, etc. Traffic classification also plays an important role in network management, for example in traffic prediction and Quality of Service (QoS) provisioning. 628

2 Related Work Abnormal Traffic Detection Traffic classification has been studied for several years. Traffic classification were mainly used to improve service quality in the first years. T. Karagiannis [1] studied how to evaluate the behavior of computer based on transport layer data. J. Erman studied several algorithms to cluster network traffic such as K-Means, DBSCAN and AutoClass. The result showed that DBSCAN performs best in this scenario. H. Kim [3] studied several classification algorithms to classify network traffic. The result showed that Support Vector Machine (SVM) performs best in this scenario. L. Grimaudo [4] studied semi-supervised machine learning method to classify network traffic. Semi-supervised machine learning can be used to improve the accuracy for new application protocol. T. Bakhshi and B. Ghita studied to detect abnormal network traffic with application information. Alina Vladu tu [6] proposed a framework to classify network traffic both for supervised machine learning and unsupervised machine learning. A. L. Buczak [7] gave a survey for abnormal network traffic detection. Training Dataset We refer the KDD CUP 99 [8] dataset as our benchmark dataset. T. Mahbod [9] abstracted the dataset with more detailed information which is named as NSL-KDD. We use this modified dataset in the following experiment. In the following work, the authors also used this dataset. W. Lee [10] compared several classification algorithms including random forests, SVM, J48, CARI and Naive Bayes. They showed that random forests can achieve the accuracy rate more than 96%. Later, Revathi [11] applied SOM neural network on both KDD CUP 99 and NSL-KDD datasets. R. Calix [12] tested SVM algorithm on NSL-KDD dataset. The accuracy rate is lower than 80%. M. Panda [13] compared several two-category classification. The ensemble classifier based on random forests can reach the accuracy rate as 99%. Our Contribution We verify the feasibility of using machine learning and statistical features to detect abnormal traffic through experimental methods. Through experiments, we found that the combination of multiple classifiers can significantly improve the accuracy of classification. The ensemble classifier can achieve satisfied accuracy based on weak classifiers. The algorithms we use are decision tree and KNN algorithm. The training process of decision tree algorithm consumes less computing resources. The training process of KNN algorithm is to add new samples to the existing sample set. Therefore, these two algorithms are efficient algorithms to save computing resources, but the ensemble classifier can achieve good accuracy. By simulating the network attack environment, we collect new network attack traffic. We use the ensemble classifier trained on the NSL-KDD dataset on this new traffic. By append the new trading data with high confidence to the training set and then retain the classifier to detect new attack adaptively, we get semi-supervised classifier. The experiment shows that this semi-supervised classifier can improve the accuracy to detect zero-day Attack. System Model We first introduce the training dataset and data preprocessing procedure. Dataset and Data Preprocessing There are many application scenarios in the field of network data mining such as QoS management, situation analysis. In the field of abnormal traffic detection or intrusion detection we studied, related studies have been carried out since the end of last century. In 1998 and 1999, DARPA obtains a batch of tagged data sets by attacking and auditing in a simulated military network. These data were used not only as standard data in the 1999 KDD competition, but also as a standard for evaluating 629

3 algorithms in subsequent studies. We selected the KDD data set as the test data in the experiment, and used the characteristics defined by it as the basis for our classification. 1) KDD Feature description In order to investigate and evaluate intrusion detection system, Lincoln laboratory in MIT established 1998 DARPA intrusion detection and evaluation project. This project provides data to be used as a benchmark. These data contain a wide range of attack types, which are generated in a network by simulating various attacks. The 1999 KDD intrusion detection competition uses a derived version of the DARPA1998 dataset. From the original network traffic to the connection record definition defined by KDD, the processing process is as follows: Traffic is processed into connection records, where basic features, such as protocol type, connection duration, and so on, can be obtained. Another type of connection feature is obtained by checking the payload contents of datagrams, which are called content features. The last feature is derived from multiple join records. This is because a lot of attacks involve more than one connection, and most of these connections are continuous. There are two statistical methods, one is based on the two second time window, and the other is based on the previous one hundred connections. It is important to note that because of the widespread use of various encryption methods in the IP load, the intrusion detection based on context detection is now not considered an effective method. So these features from payload contents have not been extracted in our experiments. These features were defined by W. Lee [9]. 2) Data Classification There are two options on the classification of the attack sample: Two classifications, all the data are classified into normal or abnormal. Multi classification, all the data are classified into four types. The four types are Probing attack, Denial of Service (DoS) attack, User-to-Root (U2R) attack and Remote-to-Login (R2L) attack. The two classification and multiple classifications described in the following experimental procedures refer to these two schemes. 3) The Characters of KDD and NSL-KDD Dataset The KDD dataset is very large, and there are nearly five million records in the original dataset. Using all of the original data for training becomes a way to get stuck in a situation where the computing resources are not abundant. Thus, the usual approach is to sample a small fraction from the random set as a training set or a test set. The usual practice is to select 10% randomly, that is the training is carried out on a sample set of nearly five hundred thousand records. The problem with this is that classifiers are not able to make full use of dataset. There is a risk that the classifier that is not selected due to the relevant sample fails to obtain the rules represented by this part of the sample. On the other hand, the KDD data set is very unevenly distributed on the label. And there are a lot of duplicate redundant records in the samples of some tags. In NSL-KDD [8], the authors showed that there are more than 90% redundant data in the original attack data and there are more than 15% redundant data in the normal data. In order to make classifier training more, they eliminate the redundant data from the dataset. Then the samples are randomly extracted according to the inverse probability of distribution. That is NSL-KDD dataset. We use NSL-KDD dataset as our training data. 4) Data Preprocessing We chose sklearn [1] based numpy as the algorithm library for machine learning. Because of the most basic data structure of ndarray, numpy requires that its elements must be homogeneous. On the other hand, there are some columns of data in the NSL-KDD dataset is discrete string type, we used the method of coding each column to convert them into integer types 630

4 5) Features Extraction of Simulation Attack Traffic We will test the generalization ability of classifiers trained based on NSL-KDD dataset. In order to prove that the machine learning classification algorithm can detect zero-day attack, we generate simulating attack traffic with the tools provided by Kali Linux on a simulated network. The tools include ident-user-enum, massscan, metasploit, nbtscan-unixwiz, nmap and zenmap. We capture the traffic on the simulated network. We use kdd99_feature_extractor [1] to extract the features of attack traffic. Next, we will introduce our classification model. Classification Model First, we validate the feasibility of the decision tree and the KNN algorithm by cross validation on the NSL-KDD dataset. After obtaining the satisfied results, we verified that the noise in the sample did not appear overfitting during the training process by investigating the dataset. We construct an ensemble voting framework based on multiple classifiers. Then, the performance of the ensemble classifier is verified by the samples obtained from the simulated attack environment. 1) Preliminary experiments and results In order to verify the effectiveness of machine learning method, we use cross validation to test the decision tree and KNN algorithm on NSL-KDD data set where we set the parameter k=10. Further, the experimental data are randomly divided into 33% test sets and 67% training sets, and the confusion matrix of the prediction results is calculated as in Table 1 and Table 2. Table 1. Cross validation results of Multi classification algorithms on NSL-KDD. Decision Tree normal probe dos r2l u2r normal probe dos r2l u2r KNN normal probe dos r2l u2r normal probe dos r2l u2r Table 2. Confusion matrix of two classification based on decision tree and KNN algorithm. Decision Tree KNN Normal attack normal attack normal normal attack attack In the preliminary experiment, we found that the performance of the depth learning algorithm is not as good as that of the simple learning algorithm. Combined with the previous results of other researchers, we only used decision tree and KNN for our machine learning algorithm in the latter experiment. The accuracy rate is in Table 3. Table 3. Cross validation results of different classification algorithms on NSL-KDD. Decision Tree KNN Two Classification 99.78% 99.62% Multi Classification 99.78% 99.30% From the confusion matrix, we can see that the decision tree classifier performs well both on the two indexes of accuracy and recall rate. In order to verify that the classifier does not appear 631

5 overfitting, we first test the trained decision tree on the training set and the test set respectively. The accuracy rate is similar, so it can be considered that there is no obvious overfitting. We examine the redundancy of the NSL-KDD dataset. If the data in the training set and the test set appear similar, it will cause the false positive rate of the accuracy. First, hash values are calculated for each sample in the dataset and stored in a table. Then select the random number of subscript, the number of the original set 10% of the test set, traverse the hash table for comparison, if found the same hash value, the original data is further compared to each component. If exactly the same, the output finds duplicate data. The result of the examination is to find 6 pairs of duplicate data. For there are more than data in the NSL-KDD dataset, the duplicate data is negligible. We get the conclusion that decision tree algorithm is an effective classification method in the field of abnormal traffic detection. 2) Ensemble Classification Previous experiments have obtained relatively successful results on known datasets. We will carry a further test on the new dataset, which is to detect the unknown abnormal network traffic. This paper uses the current new attack tools to simulate attack behavior in the test environment, which is a new attack traffic relative to the NSL-KDD dataset. There are two kinds of errors in machine learning: bias and variance. Different classifiers have their own unique tendency in these two kinds of errors, so there are different performances on the same training set. Taking decision tree algorithm as an example, if the convergence condition is too harsh to define, it is easy to cause the phenomenon of overfitting, the performance is too large variance. The decision tree model takes the rules from the noise in the training set into the process of prediction, and the decision tree classifier is likely to make wrong classification. In addition, because the type of attack is changing rapidly, we hope that the classification model can be constantly updated, so as to continue to constantly change the type of attack to better detection. We take the idea of semi-supervised learning on this issue. In the data classification process, if found the classifier outputs classification results of a dataset with high confidence, we can think that the judgment is accurate, then put the dataset to the training set. If the new dataset contains relatively new attack traffic, then we can achieve the goal of updating the classifier. If multiple classifiers work at the same time when the new dataset is predicted, it is possible to obtain the data with high confidence level described above. Based on the above discussion, we propose the scheme of ensemble classification. By training multiple classifiers individually, and then considering their prediction results on unknown data, the prediction error is reduced, and the confidence is increased. The purpose of updating training set can be achieved. 3) Semi-Supervised Strategy Our original training set is based on NSL-KDD. We train an ensemble classifier with decision tree and KNN algorithms. In order to increase the accuracy, we apply semi-supervised strategy on it. We collect a testing data set in the experiments. We use attack tools in Kali Linux to simulate attack behaviors in a testing network. The network traffic is collected to build a testing data set without label. We use the ensemble classifier to detect abnormal traffic. If a traffic data is voted as an attack by more than 2/3 independent classifiers in the ensemble classifier, we take it as an abnormal traffic with high confidence. All of the data with high confidence is merged into the training data set to refine the classifiers. The experiment shows that this semi-supervised strategy will increase the accuracy. 4) Schemes First, in order to obtain multi classifiers, two algorithms of decision tree and KNN are selected, each classifier has three instances. Then, 30% of the NSL-KDD dataset is randomly sampled as training sets for each classifier. At the same time, in order to test the performance of two classification and multi classification, we trained two classifiers and multi classifiers. What we specify is that if there are 1/3, most classifiers assume abnormal traffic, then attack behavior is judged. 632

6 Figure 1. Comparison accuracy between ensemble classifier and individual classifier. Experimental Results and Discussion 1) Preliminary Experimental Results The results of preliminary experiments on NSL-KDD datasets show that the decision tree and KNN algorithm are feasible in the detection of abnormal traffic. For the existing traffic, the accuracy is very close to 1. This is because the decision tree algorithm can produce nonlinear rules, so its assumptions are more flexible, more able to describe the law of data sets. Furthermore, because the NSL-KDD data set itself comes from DARPA1998 data, its attack and normal traffic are generated at the same time period, and there is a certain similarity in itself, so it is easier to produce higher scores. In fact, in [8], the author also mentioned that one of the goals of proposing NSL-KDD data sets is to make the scores of different classifiers widen. The experiment result can be found in Figure 1. 2) Experimental Results for Ensemble Classification The classification results of ensemble classifiers are analyzed, and it is easy to find the following points: For some attacks, such as ident-user-enum, Metasploit, nbtscan and so on, the decision tree algorithm has a very high accuracy. This is because the attack patterns of these tools are close to those of the traditional attack, so it is easier to determine the abnormal traffic by the rules extracted by the decision tree algorithm from the training set. In some attacks, such as the zenmap model of intense, the KNN algorithm which is not outstanding in most cases shows much better accuracy than the decision tree algorithm. Observing the accuracy of an ensemble classifier and the performance of a single classifier can find that the accuracy of integration is very close to the accuracy of the best performing members. The above two points verify the rationality of the ensemble classifier. For voting rules, we choose 1/3 as threshold. If all members have more than 1/3 to represent the data to be measured as attack data, they are abnormal data. The reason to choose a threshold lower than 1/2 is that the data set is not balance. Attack traffic is much less than normal traffic in the network. 3) Experimental Results for Semi-Supervised ML As in Figure 2, if we append new simulation data with high confidence to the training data set to get a semi-supervised classifier, the accuracy is improved. Especially for new attack technique, such as Masscan. This shows that semi-supervised ML will help the classifier to detect new attack traffic efficiently. 633

7 Figure 2. Comparison accuracy between original resemble classifier and semi-supervised classifier. Conclusion By using the basic and statistical attributes of network traffic, we explore a scheme to detect abnormal traffic using machine learning. In particular, we investigate the advantages of ensemble classifiers for improving classifier performance on the whole. In the early stage of the experiment, we validate the NSL-KDD data set as an anomaly detection field of standard data sets, and in this data set to verify the performance of decision tree algorithm and KNN algorithm, which verifies the feasibility of the abnormal flow of machine learning. Furthermore, we use the ensemble classifier trained on the NSL-KDD dataset to validate the extracted traffic in the simulated attack environment. It is proved that the machine learning method does have the ability to resist zero-day attack. The ensemble method can classify several weak classifier sets into a strong classifier. References [1] Karagiannis, Thomas, Konstantina Papagiannaki, and Michalis Faloutsos. "BLINC: multilevel traffic classification in the dark." ACM SIGCOMM Computer Communication Review. Vol. 35. No. 4. ACM, [2] Erman, Jeffrey, Martin Arlitt, and Anirban Mahanti. "Traffic classification using clustering algorithms." Proceedings of the 2006 SIGCOMM workshop on Mining network data. ACM, [3] Kim, Hyunchul, et al. "Internet traffic classification demystified: myths, caveats, and the best practices." Proceedings of the 2008 ACM CoNEXT conference. ACM, [4] Grimaudo, Luigi, et al. "Select: Self-learning classifier for internet traffic." IEEE Transactions on Network and Service Management, 11.2 (2014): [5] Bakhshi, Taimur, and Bogdan Ghita. "On Internet Traffic Classification: A Two-Phased Machine Learning Approach." Journal of Computer Networks and Communications, 2016 (2016). [6] Vlăduţu, Alina, Dragoş Comăneci, and Ciprian Dobre. "Internet traffic classification based on flows' statistical properties with machine learning." International Journal of Network Management, 27.3 (2017). [7] Buczak, Anna L., and Erhan Guven. "A survey of data mining and machine learning methods for cyber security intrusion detection." IEEE Communications Surveys & Tutorials, 18.2 (2016): [8] [9] Tavallaee, Mahbod, et al. "A detailed analysis of the KDD CUP 99 data set." Computational Intelligence for Security and Defense Applications, CISDA IEEE Symposium on. IEEE,

8 [10] Lee, Wenke, Salvatore J. Stolfo, and Kui W. Mok. "A data mining framework for building intrusion detection models." Security and Privacy, Proceedings of the 1999 IEEE Symposium on. IEEE, [11] Revathi, S., and A. Malathi. "A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection." (2013). [12] Ibrahim, Laheeb M., Dujan T. Basheer, and Mahmod S. Mahmod. "A comparison study for intrusion database (Kdd99, Nsl-Kdd) based on self organization map (SOM) artificial neural network." Journal of Engineering Science and Technology, 8.1 (2013): [13] Calix, Ricardo A., and Rajesh Sankaran. "Feature Ranking and Support Vector Machines Classification Analysis of the NSL-KDD Intrusion Detection Corpus." FLAIRS Conference [14] Panda, Mrutyunjaya, Ajith Abraham, and Manas Ranjan Patra. "A hybrid intelligent approach for network intrusion detection." Procedia Engineering, 30 (2012):

Keywords Traffic classification, Traffic flows, Naïve Bayes, Bag-of-Flow (BoF), Correlation information, Parametric approach

Keywords Traffic classification, Traffic flows, Naïve Bayes, Bag-of-Flow (BoF), Correlation information, Parametric approach Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Optimized Intrusion Detection by CACC Discretization Via Naïve Bayes and K-Means Clustering

Optimized Intrusion Detection by CACC Discretization Via Naïve Bayes and K-Means Clustering 54 Optimized Intrusion Detection by CACC Discretization Via Naïve Bayes and K-Means Clustering Vineet Richhariya, Nupur Sharma 1 Lakshmi Narain College of Technology, Bhopal, India Abstract Network Intrusion

More information

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection

A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection S. Revathi Ph.D. Research Scholar PG and Research, Department of Computer Science Government Arts

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Efficient Flow based Network Traffic Classification using Machine Learning

Efficient Flow based Network Traffic Classification using Machine Learning Efficient Flow based Network Traffic Classification using Machine Learning Jamuna.A*, Vinodh Ewards S.E** *(Department of Computer Science and Engineering, Karunya University, Coimbatore-114) ** (Assistant

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017 Internet Traffic Classification Using Machine Learning Tanjila Ahmed Dec 6, 2017 Agenda 1. Introduction 2. Motivation 3. Methodology 4. Results 5. Conclusion 6. References Motivation Traffic classification

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

Performance Analysis of various classifiers using Benchmark Datasets in Weka tools

Performance Analysis of various classifiers using Benchmark Datasets in Weka tools Performance Analysis of various classifiers using Benchmark Datasets in Weka tools Abstract Intrusion occurs in the network due to redundant and irrelevant data that cause problem in network traffic classification.

More information

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detecting and Classifying

More information

Contents. Preface to the Second Edition

Contents. Preface to the Second Edition Preface to the Second Edition v 1 Introduction 1 1.1 What Is Data Mining?....................... 4 1.2 Motivating Challenges....................... 5 1.3 The Origins of Data Mining....................

More information

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,

More information

A study on fuzzy intrusion detection

A study on fuzzy intrusion detection A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca

More information

Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques

Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques Vineet Richhariya, Dr. J.L.Rana,Dr. R.C.Jain,Dr. R.K.Pandey Asst. Professor Director, Director,

More information

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network

An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network International Journal of Science and Engineering Investigations vol. 6, issue 62, March 2017 ISSN: 2251-8843 An Ensemble Data Mining Approach for Intrusion Detection in a Computer Network Abisola Ayomide

More information

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 06, 2014 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 06, 2014 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 06, 2014 ISSN (online): 2321-0613 IDS Using Classification Teachniques in Weka Environment With Feature Reduction Jyoti

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Feature Selection in the Corrected KDD -dataset

Feature Selection in the Corrected KDD -dataset Feature Selection in the Corrected KDD -dataset ZARGARI, Shahrzad Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/17048/ This document is the author deposited

More information

Detection of DDoS Attack on the Client Side Using Support Vector Machine

Detection of DDoS Attack on the Client Side Using Support Vector Machine Detection of DDoS Attack on the Client Side Using Support Vector Machine Donghoon Kim * and Ki Young Lee** *Department of Information and Telecommunication Engineering, Incheon National University, Incheon,

More information

Deep Learning Approach to Network Intrusion Detection

Deep Learning Approach to Network Intrusion Detection Deep Learning Approach to Network Intrusion Detection Paper By : Nathan Shone, Tran Nguyen Ngoc, Vu Dinh Phai, Qi Shi Presented by : Romi Bajracharya Overview Introduction Limitation with NIDS Proposed

More information

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion

More information

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM

A NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Intrusion detection system with decision tree and combine method algorithm

Intrusion detection system with decision tree and combine method algorithm International Academic Institute for Science and Technology International Academic Journal of Science and Engineering Vol. 3, No. 8, 2016, pp. 21-31. ISSN 2454-3896 International Academic Journal of Science

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

DDoS Detection in SDN Switches using Support Vector Machine Classifier

DDoS Detection in SDN Switches using Support Vector Machine Classifier Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) DDoS Detection in SDN Switches using Support Vector Machine Classifier Xue Li1, a *, Dongming Yuan2,b, Hefei

More information

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH

INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH INTRUSION DETECTION MODEL IN DATA MINING BASED ON ENSEMBLE APPROACH VIKAS SANNADY 1, POONAM GUPTA 2 1Asst.Professor, Department of Computer Science, GTBCPTE, Bilaspur, chhattisgarh, India 2Asst.Professor,

More information

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks

Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Vol. () December, pp. 9-8 ISSN95-9X Combination of Three Machine Learning Algorithms for Intrusion Detection Systems in Computer Networks Ali Reza Zebarjad, Mohmmad Mehdi Lotfinejad Dapartment of Computer,

More information

Ranking and Filtering the Selected Attributes for Intrusion Detection System

Ranking and Filtering the Selected Attributes for Intrusion Detection System Ranking and Filtering the Selected Attributes for Intrusion Detection System Phyu Thi Htun and Kyaw Thet Khaing Abstract Many researchers have been focused on improving the performance, especially in accuracy

More information

Intrusion detection in computer networks through a hybrid approach of data mining and decision trees

Intrusion detection in computer networks through a hybrid approach of data mining and decision trees WALIA journal 30(S1): 233237, 2014 Available online at www.waliaj.com ISSN 10263861 2014 WALIA Intrusion detection in computer networks through a hybrid approach of data mining and decision trees Tayebeh

More information

Supervised Learning Classification Algorithms Comparison

Supervised Learning Classification Algorithms Comparison Supervised Learning Classification Algorithms Comparison Aditya Singh Rathore B.Tech, J.K. Lakshmipat University -------------------------------------------------------------***---------------------------------------------------------

More information

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 89 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 117 123 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) Performance Evaluation

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

Network Intrusion Detection Using Fast k-nearest Neighbor Classifier

Network Intrusion Detection Using Fast k-nearest Neighbor Classifier Network Intrusion Detection Using Fast k-nearest Neighbor Classifier K. Swathi 1, D. Sree Lakshmi 2 1,2 Asst. Professor, Prasad V. Potluri Siddhartha Institute of Technology, Vijayawada Abstract: Fast

More information

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and

More information

Intrusion Detection System with FGA and MLP Algorithm

Intrusion Detection System with FGA and MLP Algorithm Intrusion Detection System with FGA and MLP Algorithm International Journal of Engineering Research & Technology (IJERT) Miss. Madhuri R. Yadav Department Of Computer Engineering Siddhant College Of Engineering,

More information

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets

Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets H. Günes Kayacık, A. Nur Zincir-Heywood, Malcolm I. Heywood Dalhousie University, Faculty

More information

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID

AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID AUTOMATED SECURITY ASSESSMENT AND MANAGEMENT OF THE ELECTRIC POWER GRID Sherif Abdelwahed Department of Electrical and Computer Engineering Mississippi State University Autonomic Security Management Modern

More information

Semi-supervised Learning

Semi-supervised Learning Semi-supervised Learning Piyush Rai CS5350/6350: Machine Learning November 8, 2011 Semi-supervised Learning Supervised Learning models require labeled data Learning a reliable model usually requires plenty

More information

Based on the fusion of neural network algorithm in the application of the anomaly detection

Based on the fusion of neural network algorithm in the application of the anomaly detection , pp.28-34 http://dx.doi.org/10.14257/astl.2016.134.05 Based on the fusion of neural network algorithm in the application of the anomaly detection Zhu YuanZhong Electrical and Information Engineering Department

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Analysis of Feature Selection Techniques: A Data Mining Approach

Analysis of Feature Selection Techniques: A Data Mining Approach Analysis of Feature Selection Techniques: A Data Mining Approach Sheena M.Tech Scholar CSE, SBSSTC Krishan Kumar Associate Professor CSE, SBSSTC Gulshan Kumar Assistant Professor MCA, SBSSTC ABSTRACT Feature

More information

Classification Of Attacks In Network Intrusion Detection System

Classification Of Attacks In Network Intrusion Detection System International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 1 Classification Of Attacks In Network Intrusion Detection System 1 Shwetambari Ramesh Patil, 2 Dr.Pradeep Deshmukh,

More information

Keywords: Intrusion Detection System, k-nearest neighbor, Support Vector Machine, Primal Dual, Particle Swarm Optimization

Keywords: Intrusion Detection System, k-nearest neighbor, Support Vector Machine, Primal Dual, Particle Swarm Optimization University of Maiduguri Faculty of Engineering Seminar Series Volume 8, march 2017 A Hybridized SVM-kNN-pdAPSO Approach to Intrusion Detection System E.G. Dada Department of Computer Engineering, Faculty

More information

Network Traffic Measurements and Analysis

Network Traffic Measurements and Analysis DEIB - Politecnico di Milano Fall, 2017 Sources Hastie, Tibshirani, Friedman: The Elements of Statistical Learning James, Witten, Hastie, Tibshirani: An Introduction to Statistical Learning Andrew Ng:

More information

Comparative Analysis of Classification Algorithms on KDD 99 Data Set

Comparative Analysis of Classification Algorithms on KDD 99 Data Set I. J. Computer Network and Information Security, 2016, 9, 34-40 Published Online September 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2016.09.05 Comparative Analysis of Classification

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

Applying Supervised Learning

Applying Supervised Learning Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

Multiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection

Multiple Classifier Fusion With Cuttlefish Algorithm Based Feature Selection Multiple Fusion With Cuttlefish Algorithm Based Feature Selection K.Jayakumar Department of Communication and Networking k_jeyakumar1979@yahoo.co.in S.Karpagam Department of Computer Science and Engineering,

More information

Active Build-Model Random Forest Method for Network Traffic Classification

Active Build-Model Random Forest Method for Network Traffic Classification Active Build-Model Random Forest Method for Network Traffic Classification Alhamza Munther #1, Rozmie Razif #2, Shahrul Nizam #3, Naseer Sabri #4, Mohammed Anbar *5 #1, 2, 3, 4 School of Computer and Communication

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Analyzing Dshield Logs Using Fully Automatic Cross-Associations

Analyzing Dshield Logs Using Fully Automatic Cross-Associations Analyzing Dshield Logs Using Fully Automatic Cross-Associations Anh Le 1 1 Donald Bren School of Information and Computer Sciences University of California, Irvine Irvine, CA, 92697, USA anh.le@uci.edu

More information

Data Mining Based Online Intrusion Detection

Data Mining Based Online Intrusion Detection International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 12 (September 2012), PP. 59-63 Data Mining Based Online Intrusion Detection

More information

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model 264 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008 Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model M. Bahrololum and M. Khaleghi

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 7, January 2015

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 7, January 2015 Intrusion Detection System using Bayesian Approach S. Saravanan, Dr. R M. Chandrasekaran Department of Computer Science & Engineering, Annamalai University Annamalainagar 608 00, Tamil Nadu, India. Abstract

More information

Dimension Reduction in Network Attacks Detection Systems

Dimension Reduction in Network Attacks Detection Systems Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 284-289 Dimension Reduction in Network Attacks Detection Systems V. V. Platonov and P. O. Semenov Saint-Petersburg State Polytechnic University,

More information

BLINC: Multilevel Traffic Classification in the Dark

BLINC: Multilevel Traffic Classification in the Dark BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization

More information

Feature Selection. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

Feature Selection. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani Feature Selection CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Dimensionality reduction Feature selection vs. feature extraction Filter univariate

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM

Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM Toward Building Lightweight Intrusion Detection System Through Modified RMHC and SVM You Chen 1,2, Wen-Fa Li 1,2, Xue-Qi Cheng 1 1 Institute of Computing Technology, Chinese Academy of Sciences 2 Graduate

More information

Detecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data

Detecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data Detecting Harmful Hand Behaviors with Machine Learning from Wearable Motion Sensor Data Lingfeng Zhang and Philip K. Chan Florida Institute of Technology, Melbourne, FL 32901 lingfeng2013@my.fit.edu, pkc@cs.fit.edu

More information

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach

A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach A Data Mining Approach for Intrusion Detection System Using Boosted Decision Tree Approach 1 Priyanka B Bera, 2 Ishan K Rajani, 1 P.G. Student, 2 Professor, 1 Department of Computer Engineering, 1 D.I.E.T,

More information

ANOMALY-BASED INTRUSION DETECTION THROUGH K- MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION

ANOMALY-BASED INTRUSION DETECTION THROUGH K- MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION ANOMALY-BASED INTRUSION DETECTION THROUGH K- MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION Warusia Yassin, Nur Izura Udzir 1, Zaiton Muda, and Md. Nasir Sulaiman 1 Faculty of Computer Science and Information

More information

Classifying Building Energy Consumption Behavior Using an Ensemble of Machine Learning Methods

Classifying Building Energy Consumption Behavior Using an Ensemble of Machine Learning Methods Classifying Building Energy Consumption Behavior Using an Ensemble of Machine Learning Methods Kunal Sharma, Nov 26 th 2018 Dr. Lewe, Dr. Duncan Areospace Design Lab Georgia Institute of Technology Objective

More information

Introduction to Data Science. Introduction to Data Science with Python. Python Basics: Basic Syntax, Data Structures. Python Concepts (Core)

Introduction to Data Science. Introduction to Data Science with Python. Python Basics: Basic Syntax, Data Structures. Python Concepts (Core) Introduction to Data Science What is Analytics and Data Science? Overview of Data Science and Analytics Why Analytics is is becoming popular now? Application of Analytics in business Analytics Vs Data

More information

Two Level Anomaly Detection Classifier

Two Level Anomaly Detection Classifier Two Level Anomaly Detection Classifier Azeem Khan Dublin City University School of Computing Dublin, Ireland raeeska2@computing.dcu.ie Shehroz Khan Department of Information Technology National University

More information

RUSMA MULYADI. Advisor: Dr. Daniel Zeng

RUSMA MULYADI. Advisor: Dr. Daniel Zeng Evaluating Classification Algorithms for Intrusion Detection Systems RUSMA MULYADI Advisor: Dr. Daniel Zeng A Master Project Report Submitted to the Department of Management Information Systems In Partial

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset

Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset International Journal of Computer Applications (0975 8887) Combination of PCA with SMOTE Resampling to Boost the Prediction Rate in Lung Cancer Dataset Mehdi Naseriparsa Islamic Azad University Tehran

More information

Comparison of different preprocessing techniques and feature selection algorithms in cancer datasets

Comparison of different preprocessing techniques and feature selection algorithms in cancer datasets Comparison of different preprocessing techniques and feature selection algorithms in cancer datasets Konstantinos Sechidis School of Computer Science University of Manchester sechidik@cs.man.ac.uk Abstract

More information

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service

Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2. 2015 Enhanced Multivariate Correlation

More information

RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE

RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE Luigi Grimaudo (luigi.grimaudo@polito.it) DataBase And Data Mining Research Group (DBDMG) Summary RapidMiner project Strengths

More information

Summary. RapidMiner Project 12/13/2011 RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE

Summary. RapidMiner Project 12/13/2011 RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE Luigi Grimaudo (luigi.grimaudo@polito.it) DataBase And Data Mining Research Group (DBDMG) Summary RapidMiner project Strengths

More information

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Yan Li, Hong-Jie Xing, Qiang Hua, Xi-Zhao Wang, Prerna Batta, Soroush Haeri, and Ljiljana Trajković Hebei University, Baoding,

More information

A Comparative Study of Supervised and Unsupervised Learning Schemes for Intrusion Detection. NIS Research Group Reza Sadoddin, Farnaz Gharibian, and

A Comparative Study of Supervised and Unsupervised Learning Schemes for Intrusion Detection. NIS Research Group Reza Sadoddin, Farnaz Gharibian, and A Comparative Study of Supervised and Unsupervised Learning Schemes for Intrusion Detection NIS Research Group Reza Sadoddin, Farnaz Gharibian, and Agenda Brief Overview Machine Learning Techniques Clustering/Classification

More information

A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection

A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Int'l Conf. on Advances on Applied Cognitive Computing ACC'17 25 A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Kaiser Nahiyan,

More information

Tunneling Activities Detection Using Machine Learning Techniques

Tunneling Activities Detection Using Machine Learning Techniques Fabien Allard 1, Renaud Dubois 1, Paul Gompel 2 and Mathieu Morel 3 1 Thales Communications 160 Boulevard de Valmy BP 82 92704 Colombes Cedex FRANCE firstname.lastname@fr.thalesgroup.com 2 pgompel@gmail.com

More information

Predicting User Ratings Using Status Models on Amazon.com

Predicting User Ratings Using Status Models on Amazon.com Predicting User Ratings Using Status Models on Amazon.com Borui Wang Stanford University borui@stanford.edu Guan (Bell) Wang Stanford University guanw@stanford.edu Group 19 Zhemin Li Stanford University

More information

CS145: INTRODUCTION TO DATA MINING

CS145: INTRODUCTION TO DATA MINING CS145: INTRODUCTION TO DATA MINING 08: Classification Evaluation and Practical Issues Instructor: Yizhou Sun yzsun@cs.ucla.edu October 24, 2017 Learnt Prediction and Classification Methods Vector Data

More information

Bayesian Spam Detection System Using Hybrid Feature Selection Method

Bayesian Spam Detection System Using Hybrid Feature Selection Method 2016 International Conference on Manufacturing Science and Information Engineering (ICMSIE 2016) ISBN: 978-1-60595-325-0 Bayesian Spam Detection System Using Hybrid Feature Selection Method JUNYING CHEN,

More information

Intrusion Detection System Using New Ensemble Boosting Approach

Intrusion Detection System Using New Ensemble Boosting Approach Intrusion Detection System Using New Ensemble Boosting Approach Snehlata S. Dongre and Kapil K. Wankhade, Members, IACSIT Abstract Security is a big issue for all networks in today s enterprise environment.

More information

An Improved KNN Classification Algorithm based on Sampling

An Improved KNN Classification Algorithm based on Sampling International Conference on Advances in Materials, Machinery, Electrical Engineering (AMMEE 017) An Improved KNN Classification Algorithm based on Sampling Zhiwei Cheng1, a, Caisen Chen1, b, Xuehuan Qiu1,

More information

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection

Ensemble of Soft Computing Techniques for Intrusion Detection. Ensemble of Soft Computing Techniques for Intrusion Detection Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

CPSC 340: Machine Learning and Data Mining. Probabilistic Classification Fall 2017

CPSC 340: Machine Learning and Data Mining. Probabilistic Classification Fall 2017 CPSC 340: Machine Learning and Data Mining Probabilistic Classification Fall 2017 Admin Assignment 0 is due tonight: you should be almost done. 1 late day to hand it in Monday, 2 late days for Wednesday.

More information

Feature Selection for Black Hole Attacks

Feature Selection for Black Hole Attacks Journal of Universal Computer Science, vol. 22, no. 4 (2016), 521-536 submitted: 1/10/15, accepted: 30/3/16, appeared: 1/4/16 J.UCS Feature Selection for Black Hole Attacks Muneer Bani Yassein (Currently

More information

Can we trust the inter-packet time for traffic classification?

Can we trust the inter-packet time for traffic classification? Can we trust the inter-packet time for traffic classification? Mohamad Jaber, Roberto G. Cascella and Chadi Barakat INRIA Sophia Antipolis, EPI Planète 2004, Route des Luciolles Sophia Antipolis, France

More information

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ)

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ) MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ) Application of Machine Learning to Testing in Finance, Cyber, and Software Innovation center, Washington, D.C. THE SCIENCE OF TEST WORKSHOP 2017 AGENDA

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

Diversified Intrusion Detection with Various Detection Methodologies Using Sensor Fusion

Diversified Intrusion Detection with Various Detection Methodologies Using Sensor Fusion ISSN (Online) : 239-8753 ISSN (Print) : 2347-670 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 204 204 International Conference on

More information

A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection

A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection A Review on Performance Comparison of Artificial Intelligence Techniques Used for Intrusion Detection Navaneet Kumar Sinha 1, Gulshan Kumar 2 and Krishan Kumar 3 1 Department of Computer Science & Engineering,

More information

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques 24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE

More information

Performance Evaluation of Various Classification Algorithms

Performance Evaluation of Various Classification Algorithms Performance Evaluation of Various Classification Algorithms Shafali Deora Amritsar College of Engineering & Technology, Punjab Technical University -----------------------------------------------------------***----------------------------------------------------------

More information

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage Automated Traffic Classification and Application Identification using Machine Learning Sebastian Zander, Thuy Nguyen, Grenville Armitage {szander,tnguyen,garmitage}@swin.edu.au Centre for Advanced Internet

More information

Classification of Log Files with Limited Labeled Data

Classification of Log Files with Limited Labeled Data Classification of Log Files with Limited Labeled Data Stefan Hommes, Radu State, Thomas Engel University of Luxembourg 15.10.2013 1 Motivation Firewall log files store all accepted and dropped connections.

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Improvising an Intrusion Detection Precision of ANN Based Hybrid NIDS by incorporating Various Data Normalization Techniques - A Performance Appraisal A.M.Chandrashekhar 1, K. Raghuveer 2 1 Department

More information

Analysis on the technology improvement of the library network information retrieval efficiency

Analysis on the technology improvement of the library network information retrieval efficiency Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2198-2202 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis on the technology improvement of the

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information